xref: /llvm-project/lldb/source/Plugins/ObjectFile/ELF/ObjectFileELF.cpp (revision 47037bc4d71702cf5de20f179ebbfc2b51fe631f)
1 //===-- ObjectFileELF.cpp ------------------------------------- -*- C++ -*-===//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 
10 #include "ObjectFileELF.h"
11 
12 #include <cassert>
13 #include <algorithm>
14 
15 #include "lldb/Core/ArchSpec.h"
16 #include "lldb/Core/DataBuffer.h"
17 #include "lldb/Core/Error.h"
18 #include "lldb/Core/FileSpecList.h"
19 #include "lldb/Core/Module.h"
20 #include "lldb/Core/PluginManager.h"
21 #include "lldb/Core/Section.h"
22 #include "lldb/Core/Stream.h"
23 #include "lldb/Symbol/SymbolContext.h"
24 #include "lldb/Host/Host.h"
25 
26 #include "llvm/ADT/PointerUnion.h"
27 
28 #define CASE_AND_STREAM(s, def, width)                  \
29     case def: s->Printf("%-*s", width, #def); break;
30 
31 using namespace lldb;
32 using namespace lldb_private;
33 using namespace elf;
34 using namespace llvm::ELF;
35 
36 namespace {
37 //===----------------------------------------------------------------------===//
38 /// @class ELFRelocation
39 /// @brief Generic wrapper for ELFRel and ELFRela.
40 ///
41 /// This helper class allows us to parse both ELFRel and ELFRela relocation
42 /// entries in a generic manner.
43 class ELFRelocation
44 {
45 public:
46 
47     /// Constructs an ELFRelocation entry with a personality as given by @p
48     /// type.
49     ///
50     /// @param type Either DT_REL or DT_RELA.  Any other value is invalid.
51     ELFRelocation(unsigned type);
52 
53     ~ELFRelocation();
54 
55     bool
56     Parse(const lldb_private::DataExtractor &data, uint32_t *offset);
57 
58     static unsigned
59     RelocType32(const ELFRelocation &rel);
60 
61     static unsigned
62     RelocType64(const ELFRelocation &rel);
63 
64     static unsigned
65     RelocSymbol32(const ELFRelocation &rel);
66 
67     static unsigned
68     RelocSymbol64(const ELFRelocation &rel);
69 
70 private:
71     typedef llvm::PointerUnion<ELFRel*, ELFRela*> RelocUnion;
72 
73     RelocUnion reloc;
74 };
75 
76 ELFRelocation::ELFRelocation(unsigned type)
77 {
78     if (type == DT_REL)
79         reloc = new ELFRel();
80     else if (type == DT_RELA)
81         reloc = new ELFRela();
82     else {
83         assert(false && "unexpected relocation type");
84         reloc = static_cast<ELFRel*>(NULL);
85     }
86 }
87 
88 ELFRelocation::~ELFRelocation()
89 {
90     if (reloc.is<ELFRel*>())
91         delete reloc.get<ELFRel*>();
92     else
93         delete reloc.get<ELFRela*>();
94 }
95 
96 bool
97 ELFRelocation::Parse(const lldb_private::DataExtractor &data, uint32_t *offset)
98 {
99     if (reloc.is<ELFRel*>())
100         return reloc.get<ELFRel*>()->Parse(data, offset);
101     else
102         return reloc.get<ELFRela*>()->Parse(data, offset);
103 }
104 
105 unsigned
106 ELFRelocation::RelocType32(const ELFRelocation &rel)
107 {
108     if (rel.reloc.is<ELFRel*>())
109         return ELFRel::RelocType32(*rel.reloc.get<ELFRel*>());
110     else
111         return ELFRela::RelocType32(*rel.reloc.get<ELFRela*>());
112 }
113 
114 unsigned
115 ELFRelocation::RelocType64(const ELFRelocation &rel)
116 {
117     if (rel.reloc.is<ELFRel*>())
118         return ELFRel::RelocType64(*rel.reloc.get<ELFRel*>());
119     else
120         return ELFRela::RelocType64(*rel.reloc.get<ELFRela*>());
121 }
122 
123 unsigned
124 ELFRelocation::RelocSymbol32(const ELFRelocation &rel)
125 {
126     if (rel.reloc.is<ELFRel*>())
127         return ELFRel::RelocSymbol32(*rel.reloc.get<ELFRel*>());
128     else
129         return ELFRela::RelocSymbol32(*rel.reloc.get<ELFRela*>());
130 }
131 
132 unsigned
133 ELFRelocation::RelocSymbol64(const ELFRelocation &rel)
134 {
135     if (rel.reloc.is<ELFRel*>())
136         return ELFRel::RelocSymbol64(*rel.reloc.get<ELFRel*>());
137     else
138         return ELFRela::RelocSymbol64(*rel.reloc.get<ELFRela*>());
139 }
140 
141 } // end anonymous namespace
142 
143 //------------------------------------------------------------------
144 // Static methods.
145 //------------------------------------------------------------------
146 void
147 ObjectFileELF::Initialize()
148 {
149     PluginManager::RegisterPlugin(GetPluginNameStatic(),
150                                   GetPluginDescriptionStatic(),
151                                   CreateInstance,
152                                   CreateMemoryInstance);
153 }
154 
155 void
156 ObjectFileELF::Terminate()
157 {
158     PluginManager::UnregisterPlugin(CreateInstance);
159 }
160 
161 const char *
162 ObjectFileELF::GetPluginNameStatic()
163 {
164     return "object-file.elf";
165 }
166 
167 const char *
168 ObjectFileELF::GetPluginDescriptionStatic()
169 {
170     return "ELF object file reader.";
171 }
172 
173 ObjectFile *
174 ObjectFileELF::CreateInstance (const lldb::ModuleSP &module_sp,
175                                DataBufferSP &data_sp,
176                                const FileSpec *file,
177                                addr_t offset,
178                                addr_t length)
179 {
180     if (data_sp && data_sp->GetByteSize() > (llvm::ELF::EI_NIDENT + offset))
181     {
182         const uint8_t *magic = data_sp->GetBytes() + offset;
183         if (ELFHeader::MagicBytesMatch(magic))
184         {
185             unsigned address_size = ELFHeader::AddressSizeInBytes(magic);
186             if (address_size == 4 || address_size == 8)
187             {
188                 std::auto_ptr<ObjectFileELF> objfile_ap(new ObjectFileELF(module_sp, data_sp, file, offset, length));
189                 ArchSpec spec;
190                 if (objfile_ap->GetArchitecture(spec) &&
191                     objfile_ap->SetModulesArchitecture(spec))
192                     return objfile_ap.release();
193             }
194         }
195     }
196     return NULL;
197 }
198 
199 
200 ObjectFile*
201 ObjectFileELF::CreateMemoryInstance (const lldb::ModuleSP &module_sp,
202                                      DataBufferSP& data_sp,
203                                      const lldb::ProcessSP &process_sp,
204                                      lldb::addr_t header_addr)
205 {
206     return NULL;
207 }
208 
209 
210 //------------------------------------------------------------------
211 // PluginInterface protocol
212 //------------------------------------------------------------------
213 const char *
214 ObjectFileELF::GetPluginName()
215 {
216     return "ObjectFileELF";
217 }
218 
219 const char *
220 ObjectFileELF::GetShortPluginName()
221 {
222     return GetPluginNameStatic();
223 }
224 
225 uint32_t
226 ObjectFileELF::GetPluginVersion()
227 {
228     return m_plugin_version;
229 }
230 //------------------------------------------------------------------
231 // ObjectFile protocol
232 //------------------------------------------------------------------
233 
234 ObjectFileELF::ObjectFileELF (const lldb::ModuleSP &module_sp,
235                               DataBufferSP& dataSP,
236                               const FileSpec* file,
237                               addr_t offset,
238                               addr_t length) :
239     ObjectFile(module_sp, file, offset, length, dataSP),
240     m_header(),
241     m_program_headers(),
242     m_section_headers(),
243     m_sections_ap(),
244     m_symtab_ap(),
245     m_filespec_ap(),
246     m_shstr_data()
247 {
248     if (file)
249         m_file = *file;
250     ::memset(&m_header, 0, sizeof(m_header));
251 }
252 
253 ObjectFileELF::~ObjectFileELF()
254 {
255 }
256 
257 bool
258 ObjectFileELF::IsExecutable() const
259 {
260     return m_header.e_entry != 0;
261 }
262 
263 ByteOrder
264 ObjectFileELF::GetByteOrder() const
265 {
266     if (m_header.e_ident[EI_DATA] == ELFDATA2MSB)
267         return eByteOrderBig;
268     if (m_header.e_ident[EI_DATA] == ELFDATA2LSB)
269         return eByteOrderLittle;
270     return eByteOrderInvalid;
271 }
272 
273 size_t
274 ObjectFileELF::GetAddressByteSize() const
275 {
276     return m_data.GetAddressByteSize();
277 }
278 
279 unsigned
280 ObjectFileELF::SectionIndex(const SectionHeaderCollIter &I)
281 {
282     return std::distance(m_section_headers.begin(), I) + 1;
283 }
284 
285 unsigned
286 ObjectFileELF::SectionIndex(const SectionHeaderCollConstIter &I) const
287 {
288     return std::distance(m_section_headers.begin(), I) + 1;
289 }
290 
291 bool
292 ObjectFileELF::ParseHeader()
293 {
294     uint32_t offset = GetOffset();
295     return m_header.Parse(m_data, &offset);
296 }
297 
298 bool
299 ObjectFileELF::GetUUID(lldb_private::UUID* uuid)
300 {
301     // FIXME: Return MD5 sum here.  See comment in ObjectFile.h.
302     return false;
303 }
304 
305 uint32_t
306 ObjectFileELF::GetDependentModules(FileSpecList &files)
307 {
308     size_t num_modules = ParseDependentModules();
309     uint32_t num_specs = 0;
310 
311     for (unsigned i = 0; i < num_modules; ++i)
312     {
313         if (files.AppendIfUnique(m_filespec_ap->GetFileSpecAtIndex(i)))
314             num_specs++;
315     }
316 
317     return num_specs;
318 }
319 
320 user_id_t
321 ObjectFileELF::GetSectionIndexByType(unsigned type)
322 {
323     if (!ParseSectionHeaders())
324         return 0;
325 
326     for (SectionHeaderCollIter sh_pos = m_section_headers.begin();
327          sh_pos != m_section_headers.end(); ++sh_pos)
328     {
329         if (sh_pos->sh_type == type)
330             return SectionIndex(sh_pos);
331     }
332 
333     return 0;
334 }
335 
336 Address
337 ObjectFileELF::GetImageInfoAddress()
338 {
339     if (!ParseDynamicSymbols())
340         return Address();
341 
342     SectionList *section_list = GetSectionList();
343     if (!section_list)
344         return Address();
345 
346     user_id_t dynsym_id = GetSectionIndexByType(SHT_DYNAMIC);
347     if (!dynsym_id)
348         return Address();
349 
350     const ELFSectionHeader *dynsym_hdr = GetSectionHeaderByIndex(dynsym_id);
351     if (!dynsym_hdr)
352         return Address();
353 
354     SectionSP dynsym_section_sp (section_list->FindSectionByID(dynsym_id));
355     if (dynsym_section_sp)
356     {
357         for (size_t i = 0; i < m_dynamic_symbols.size(); ++i)
358         {
359             ELFDynamic &symbol = m_dynamic_symbols[i];
360 
361             if (symbol.d_tag == DT_DEBUG)
362             {
363                 // Compute the offset as the number of previous entries plus the
364                 // size of d_tag.
365                 addr_t offset = i * dynsym_hdr->sh_entsize + GetAddressByteSize();
366                 return Address(dynsym_section_sp, offset);
367             }
368         }
369     }
370 
371     return Address();
372 }
373 
374 lldb_private::Address
375 ObjectFileELF::GetEntryPointAddress ()
376 {
377     SectionList *sections;
378     addr_t offset;
379 
380     if (m_entry_point_address.IsValid())
381         return m_entry_point_address;
382 
383     if (!ParseHeader() || !IsExecutable())
384         return m_entry_point_address;
385 
386     sections = GetSectionList();
387     offset = m_header.e_entry;
388 
389     if (!sections)
390     {
391         m_entry_point_address.SetOffset(offset);
392         return m_entry_point_address;
393     }
394 
395     m_entry_point_address.ResolveAddressUsingFileSections(offset, sections);
396 
397     return m_entry_point_address;
398 }
399 
400 //----------------------------------------------------------------------
401 // ParseDependentModules
402 //----------------------------------------------------------------------
403 size_t
404 ObjectFileELF::ParseDependentModules()
405 {
406     if (m_filespec_ap.get())
407         return m_filespec_ap->GetSize();
408 
409     m_filespec_ap.reset(new FileSpecList());
410 
411     if (!(ParseSectionHeaders() && GetSectionHeaderStringTable()))
412         return 0;
413 
414     // Locate the dynamic table.
415     user_id_t dynsym_id = 0;
416     user_id_t dynstr_id = 0;
417     for (SectionHeaderCollIter sh_pos = m_section_headers.begin();
418          sh_pos != m_section_headers.end(); ++sh_pos)
419     {
420         if (sh_pos->sh_type == SHT_DYNAMIC)
421         {
422             dynsym_id = SectionIndex(sh_pos);
423             dynstr_id = sh_pos->sh_link + 1; // Section ID's are 1 based.
424             break;
425         }
426     }
427 
428     if (!(dynsym_id && dynstr_id))
429         return 0;
430 
431     SectionList *section_list = GetSectionList();
432     if (!section_list)
433         return 0;
434 
435     // Resolve and load the dynamic table entries and corresponding string
436     // table.
437     Section *dynsym = section_list->FindSectionByID(dynsym_id).get();
438     Section *dynstr = section_list->FindSectionByID(dynstr_id).get();
439     if (!(dynsym && dynstr))
440         return 0;
441 
442     DataExtractor dynsym_data;
443     DataExtractor dynstr_data;
444     if (ReadSectionData(dynsym, dynsym_data) &&
445         ReadSectionData(dynstr, dynstr_data))
446     {
447         ELFDynamic symbol;
448         const unsigned section_size = dynsym_data.GetByteSize();
449         unsigned offset = 0;
450 
451         // The only type of entries we are concerned with are tagged DT_NEEDED,
452         // yielding the name of a required library.
453         while (offset < section_size)
454         {
455             if (!symbol.Parse(dynsym_data, &offset))
456                 break;
457 
458             if (symbol.d_tag != DT_NEEDED)
459                 continue;
460 
461             uint32_t str_index = static_cast<uint32_t>(symbol.d_val);
462             const char *lib_name = dynstr_data.PeekCStr(str_index);
463             m_filespec_ap->Append(FileSpec(lib_name, true));
464         }
465     }
466 
467     return m_filespec_ap->GetSize();
468 }
469 
470 //----------------------------------------------------------------------
471 // ParseProgramHeaders
472 //----------------------------------------------------------------------
473 size_t
474 ObjectFileELF::ParseProgramHeaders()
475 {
476     // We have already parsed the program headers
477     if (!m_program_headers.empty())
478         return m_program_headers.size();
479 
480     // If there are no program headers to read we are done.
481     if (m_header.e_phnum == 0)
482         return 0;
483 
484     m_program_headers.resize(m_header.e_phnum);
485     if (m_program_headers.size() != m_header.e_phnum)
486         return 0;
487 
488     const size_t ph_size = m_header.e_phnum * m_header.e_phentsize;
489     const elf_off ph_offset = m_header.e_phoff;
490     DataExtractor data;
491     if (GetData (ph_offset, ph_size, data) != ph_size)
492         return 0;
493 
494     uint32_t idx;
495     uint32_t offset;
496     for (idx = 0, offset = 0; idx < m_header.e_phnum; ++idx)
497     {
498         if (m_program_headers[idx].Parse(data, &offset) == false)
499             break;
500     }
501 
502     if (idx < m_program_headers.size())
503         m_program_headers.resize(idx);
504 
505     return m_program_headers.size();
506 }
507 
508 //----------------------------------------------------------------------
509 // ParseSectionHeaders
510 //----------------------------------------------------------------------
511 size_t
512 ObjectFileELF::ParseSectionHeaders()
513 {
514     // We have already parsed the section headers
515     if (!m_section_headers.empty())
516         return m_section_headers.size();
517 
518     // If there are no section headers we are done.
519     if (m_header.e_shnum == 0)
520         return 0;
521 
522     m_section_headers.resize(m_header.e_shnum);
523     if (m_section_headers.size() != m_header.e_shnum)
524         return 0;
525 
526     const size_t sh_size = m_header.e_shnum * m_header.e_shentsize;
527     const elf_off sh_offset = m_header.e_shoff;
528     DataExtractor data;
529     if (GetData (sh_offset, sh_size, data) != sh_size)
530         return 0;
531 
532     uint32_t idx;
533     uint32_t offset;
534     for (idx = 0, offset = 0; idx < m_header.e_shnum; ++idx)
535     {
536         if (m_section_headers[idx].Parse(data, &offset) == false)
537             break;
538     }
539     if (idx < m_section_headers.size())
540         m_section_headers.resize(idx);
541 
542     return m_section_headers.size();
543 }
544 
545 size_t
546 ObjectFileELF::GetSectionHeaderStringTable()
547 {
548     if (m_shstr_data.GetByteSize() == 0)
549     {
550         const unsigned strtab_idx = m_header.e_shstrndx;
551 
552         if (strtab_idx && strtab_idx < m_section_headers.size())
553         {
554             const ELFSectionHeader &sheader = m_section_headers[strtab_idx];
555             const size_t byte_size = sheader.sh_size;
556             const Elf64_Off offset = sheader.sh_offset;
557             m_shstr_data.SetData (m_data, offset, byte_size);
558 
559             if (m_shstr_data.GetByteSize() != byte_size)
560                 return 0;
561         }
562     }
563     return m_shstr_data.GetByteSize();
564 }
565 
566 lldb::user_id_t
567 ObjectFileELF::GetSectionIndexByName(const char *name)
568 {
569     if (!(ParseSectionHeaders() && GetSectionHeaderStringTable()))
570         return 0;
571 
572     // Search the collection of section headers for one with a matching name.
573     for (SectionHeaderCollIter I = m_section_headers.begin();
574          I != m_section_headers.end(); ++I)
575     {
576         const char *sectionName = m_shstr_data.PeekCStr(I->sh_name);
577 
578         if (!sectionName)
579             return 0;
580 
581         if (strcmp(name, sectionName) != 0)
582             continue;
583 
584         return SectionIndex(I);
585     }
586 
587     return 0;
588 }
589 
590 const elf::ELFSectionHeader *
591 ObjectFileELF::GetSectionHeaderByIndex(lldb::user_id_t id)
592 {
593     if (!ParseSectionHeaders() || !id)
594         return NULL;
595 
596     if (--id < m_section_headers.size())
597         return &m_section_headers[id];
598 
599     return NULL;
600 }
601 
602 SectionList *
603 ObjectFileELF::GetSectionList()
604 {
605     if (m_sections_ap.get())
606         return m_sections_ap.get();
607 
608     if (ParseSectionHeaders() && GetSectionHeaderStringTable())
609     {
610         m_sections_ap.reset(new SectionList());
611 
612         for (SectionHeaderCollIter I = m_section_headers.begin();
613              I != m_section_headers.end(); ++I)
614         {
615             const ELFSectionHeader &header = *I;
616 
617             ConstString name(m_shstr_data.PeekCStr(header.sh_name));
618             const uint64_t file_size = header.sh_type == SHT_NOBITS ? 0 : header.sh_size;
619             const uint64_t vm_size = header.sh_flags & SHF_ALLOC ? header.sh_size : 0;
620 
621             static ConstString g_sect_name_text (".text");
622             static ConstString g_sect_name_data (".data");
623             static ConstString g_sect_name_bss (".bss");
624             static ConstString g_sect_name_dwarf_debug_abbrev (".debug_abbrev");
625             static ConstString g_sect_name_dwarf_debug_aranges (".debug_aranges");
626             static ConstString g_sect_name_dwarf_debug_frame (".debug_frame");
627             static ConstString g_sect_name_dwarf_debug_info (".debug_info");
628             static ConstString g_sect_name_dwarf_debug_line (".debug_line");
629             static ConstString g_sect_name_dwarf_debug_loc (".debug_loc");
630             static ConstString g_sect_name_dwarf_debug_macinfo (".debug_macinfo");
631             static ConstString g_sect_name_dwarf_debug_pubnames (".debug_pubnames");
632             static ConstString g_sect_name_dwarf_debug_pubtypes (".debug_pubtypes");
633             static ConstString g_sect_name_dwarf_debug_ranges (".debug_ranges");
634             static ConstString g_sect_name_dwarf_debug_str (".debug_str");
635             static ConstString g_sect_name_eh_frame (".eh_frame");
636 
637             SectionType sect_type = eSectionTypeOther;
638 
639             if      (name == g_sect_name_text)                  sect_type = eSectionTypeCode;
640             else if (name == g_sect_name_data)                  sect_type = eSectionTypeData;
641             else if (name == g_sect_name_bss)                   sect_type = eSectionTypeZeroFill;
642             else if (name == g_sect_name_dwarf_debug_abbrev)    sect_type = eSectionTypeDWARFDebugAbbrev;
643             else if (name == g_sect_name_dwarf_debug_aranges)   sect_type = eSectionTypeDWARFDebugAranges;
644             else if (name == g_sect_name_dwarf_debug_frame)     sect_type = eSectionTypeDWARFDebugFrame;
645             else if (name == g_sect_name_dwarf_debug_info)      sect_type = eSectionTypeDWARFDebugInfo;
646             else if (name == g_sect_name_dwarf_debug_line)      sect_type = eSectionTypeDWARFDebugLine;
647             else if (name == g_sect_name_dwarf_debug_loc)       sect_type = eSectionTypeDWARFDebugLoc;
648             else if (name == g_sect_name_dwarf_debug_macinfo)   sect_type = eSectionTypeDWARFDebugMacInfo;
649             else if (name == g_sect_name_dwarf_debug_pubnames)  sect_type = eSectionTypeDWARFDebugPubNames;
650             else if (name == g_sect_name_dwarf_debug_pubtypes)  sect_type = eSectionTypeDWARFDebugPubTypes;
651             else if (name == g_sect_name_dwarf_debug_ranges)    sect_type = eSectionTypeDWARFDebugRanges;
652             else if (name == g_sect_name_dwarf_debug_str)       sect_type = eSectionTypeDWARFDebugStr;
653             else if (name == g_sect_name_eh_frame)              sect_type = eSectionTypeEHFrame;
654 
655 
656             SectionSP section(new Section(
657                 GetModule(),        // Module to which this section belongs.
658                 SectionIndex(I),    // Section ID.
659                 name,               // Section name.
660                 sect_type,          // Section type.
661                 header.sh_addr,     // VM address.
662                 vm_size,            // VM size in bytes of this section.
663                 header.sh_offset,   // Offset of this section in the file.
664                 file_size,          // Size of the section as found in the file.
665                 header.sh_flags));  // Flags for this section.
666 
667             m_sections_ap->AddSection(section);
668         }
669     }
670 
671     return m_sections_ap.get();
672 }
673 
674 static unsigned
675 ParseSymbols(Symtab *symtab,
676              user_id_t start_id,
677              SectionList *section_list,
678              const ELFSectionHeader *symtab_shdr,
679              const DataExtractor &symtab_data,
680              const DataExtractor &strtab_data)
681 {
682     ELFSymbol symbol;
683     uint32_t offset = 0;
684     const unsigned num_symbols =
685         symtab_data.GetByteSize() / symtab_shdr->sh_entsize;
686 
687     static ConstString text_section_name(".text");
688     static ConstString init_section_name(".init");
689     static ConstString fini_section_name(".fini");
690     static ConstString ctors_section_name(".ctors");
691     static ConstString dtors_section_name(".dtors");
692 
693     static ConstString data_section_name(".data");
694     static ConstString rodata_section_name(".rodata");
695     static ConstString rodata1_section_name(".rodata1");
696     static ConstString data2_section_name(".data1");
697     static ConstString bss_section_name(".bss");
698 
699     unsigned i;
700     for (i = 0; i < num_symbols; ++i)
701     {
702         if (symbol.Parse(symtab_data, &offset) == false)
703             break;
704 
705         SectionSP symbol_section_sp;
706         SymbolType symbol_type = eSymbolTypeInvalid;
707         Elf64_Half symbol_idx = symbol.st_shndx;
708 
709         switch (symbol_idx)
710         {
711         case SHN_ABS:
712             symbol_type = eSymbolTypeAbsolute;
713             break;
714         case SHN_UNDEF:
715             symbol_type = eSymbolTypeUndefined;
716             break;
717         default:
718             symbol_section_sp = section_list->GetSectionAtIndex(symbol_idx);
719             break;
720         }
721 
722         switch (symbol.getType())
723         {
724         default:
725         case STT_NOTYPE:
726             // The symbol's type is not specified.
727             break;
728 
729         case STT_OBJECT:
730             // The symbol is associated with a data object, such as a variable,
731             // an array, etc.
732             symbol_type = eSymbolTypeData;
733             break;
734 
735         case STT_FUNC:
736             // The symbol is associated with a function or other executable code.
737             symbol_type = eSymbolTypeCode;
738             break;
739 
740         case STT_SECTION:
741             // The symbol is associated with a section. Symbol table entries of
742             // this type exist primarily for relocation and normally have
743             // STB_LOCAL binding.
744             break;
745 
746         case STT_FILE:
747             // Conventionally, the symbol's name gives the name of the source
748             // file associated with the object file. A file symbol has STB_LOCAL
749             // binding, its section index is SHN_ABS, and it precedes the other
750             // STB_LOCAL symbols for the file, if it is present.
751             symbol_type = eSymbolTypeObjectFile;
752             break;
753         }
754 
755         if (symbol_type == eSymbolTypeInvalid)
756         {
757             if (symbol_section_sp)
758             {
759                 const ConstString &sect_name = symbol_section_sp->GetName();
760                 if (sect_name == text_section_name ||
761                     sect_name == init_section_name ||
762                     sect_name == fini_section_name ||
763                     sect_name == ctors_section_name ||
764                     sect_name == dtors_section_name)
765                 {
766                     symbol_type = eSymbolTypeCode;
767                 }
768                 else if (sect_name == data_section_name ||
769                          sect_name == data2_section_name ||
770                          sect_name == rodata_section_name ||
771                          sect_name == rodata1_section_name ||
772                          sect_name == bss_section_name)
773                 {
774                     symbol_type = eSymbolTypeData;
775                 }
776             }
777         }
778 
779         uint64_t symbol_value = symbol.st_value;
780         if (symbol_section_sp)
781             symbol_value -= symbol_section_sp->GetFileAddress();
782         const char *symbol_name = strtab_data.PeekCStr(symbol.st_name);
783         bool is_global = symbol.getBinding() == STB_GLOBAL;
784         uint32_t flags = symbol.st_other << 8 | symbol.st_info;
785         bool is_mangled = symbol_name ? (symbol_name[0] == '_' && symbol_name[1] == 'Z') : false;
786         Symbol dc_symbol(
787             i + start_id,       // ID is the original symbol table index.
788             symbol_name,        // Symbol name.
789             is_mangled,         // Is the symbol name mangled?
790             symbol_type,        // Type of this symbol
791             is_global,          // Is this globally visible?
792             false,              // Is this symbol debug info?
793             false,              // Is this symbol a trampoline?
794             false,              // Is this symbol artificial?
795             symbol_section_sp,  // Section in which this symbol is defined or null.
796             symbol_value,       // Offset in section or symbol value.
797             symbol.st_size,     // Size in bytes of this symbol.
798             flags);             // Symbol flags.
799         symtab->AddSymbol(dc_symbol);
800     }
801 
802     return i;
803 }
804 
805 unsigned
806 ObjectFileELF::ParseSymbolTable(Symtab *symbol_table, user_id_t start_id,
807                                 const ELFSectionHeader *symtab_hdr,
808                                 user_id_t symtab_id)
809 {
810     assert(symtab_hdr->sh_type == SHT_SYMTAB ||
811            symtab_hdr->sh_type == SHT_DYNSYM);
812 
813     // Parse in the section list if needed.
814     SectionList *section_list = GetSectionList();
815     if (!section_list)
816         return 0;
817 
818     // Section ID's are ones based.
819     user_id_t strtab_id = symtab_hdr->sh_link + 1;
820 
821     Section *symtab = section_list->FindSectionByID(symtab_id).get();
822     Section *strtab = section_list->FindSectionByID(strtab_id).get();
823     unsigned num_symbols = 0;
824     if (symtab && strtab)
825     {
826         DataExtractor symtab_data;
827         DataExtractor strtab_data;
828         if (ReadSectionData(symtab, symtab_data) &&
829             ReadSectionData(strtab, strtab_data))
830         {
831             num_symbols = ParseSymbols(symbol_table, start_id,
832                                        section_list, symtab_hdr,
833                                        symtab_data, strtab_data);
834         }
835     }
836 
837     return num_symbols;
838 }
839 
840 size_t
841 ObjectFileELF::ParseDynamicSymbols()
842 {
843     if (m_dynamic_symbols.size())
844         return m_dynamic_symbols.size();
845 
846     user_id_t dyn_id = GetSectionIndexByType(SHT_DYNAMIC);
847     if (!dyn_id)
848         return NULL;
849 
850     SectionList *section_list = GetSectionList();
851     if (!section_list)
852         return NULL;
853 
854     Section *dynsym = section_list->FindSectionByID(dyn_id).get();
855     if (!dynsym)
856         return NULL;
857 
858     ELFDynamic symbol;
859     DataExtractor dynsym_data;
860     if (ReadSectionData(dynsym, dynsym_data))
861     {
862 
863         const unsigned section_size = dynsym_data.GetByteSize();
864         unsigned offset = 0;
865         unsigned cursor = 0;
866 
867         while (cursor < section_size)
868         {
869             offset = cursor;
870             if (!symbol.Parse(dynsym_data, &cursor))
871                 break;
872 
873             m_dynamic_symbols.push_back(symbol);
874         }
875     }
876 
877     return m_dynamic_symbols.size();
878 }
879 
880 const ELFDynamic *
881 ObjectFileELF::FindDynamicSymbol(unsigned tag)
882 {
883     if (!ParseDynamicSymbols())
884         return NULL;
885 
886     SectionList *section_list = GetSectionList();
887     if (!section_list)
888         return 0;
889 
890     DynamicSymbolCollIter I = m_dynamic_symbols.begin();
891     DynamicSymbolCollIter E = m_dynamic_symbols.end();
892     for ( ; I != E; ++I)
893     {
894         ELFDynamic *symbol = &*I;
895 
896         if (symbol->d_tag == tag)
897             return symbol;
898     }
899 
900     return NULL;
901 }
902 
903 Section *
904 ObjectFileELF::PLTSection()
905 {
906     const ELFDynamic *symbol = FindDynamicSymbol(DT_JMPREL);
907     SectionList *section_list = GetSectionList();
908 
909     if (symbol && section_list)
910     {
911         addr_t addr = symbol->d_ptr;
912         return section_list->FindSectionContainingFileAddress(addr).get();
913     }
914 
915     return NULL;
916 }
917 
918 unsigned
919 ObjectFileELF::PLTRelocationType()
920 {
921     const ELFDynamic *symbol = FindDynamicSymbol(DT_PLTREL);
922 
923     if (symbol)
924         return symbol->d_val;
925 
926     return 0;
927 }
928 
929 static unsigned
930 ParsePLTRelocations(Symtab *symbol_table,
931                     user_id_t start_id,
932                     unsigned rel_type,
933                     const ELFHeader *hdr,
934                     const ELFSectionHeader *rel_hdr,
935                     const ELFSectionHeader *plt_hdr,
936                     const ELFSectionHeader *sym_hdr,
937                     const lldb::SectionSP &plt_section_sp,
938                     DataExtractor &rel_data,
939                     DataExtractor &symtab_data,
940                     DataExtractor &strtab_data)
941 {
942     ELFRelocation rel(rel_type);
943     ELFSymbol symbol;
944     uint32_t offset = 0;
945     const unsigned plt_entsize = plt_hdr->sh_entsize;
946     const unsigned num_relocations = rel_hdr->sh_size / rel_hdr->sh_entsize;
947 
948     typedef unsigned (*reloc_info_fn)(const ELFRelocation &rel);
949     reloc_info_fn reloc_type;
950     reloc_info_fn reloc_symbol;
951 
952     if (hdr->Is32Bit() == 4)
953     {
954         reloc_type = ELFRelocation::RelocType32;
955         reloc_symbol = ELFRelocation::RelocSymbol32;
956     }
957     else
958     {
959         reloc_type = ELFRelocation::RelocType64;
960         reloc_symbol = ELFRelocation::RelocSymbol64;
961     }
962 
963     unsigned slot_type = hdr->GetRelocationJumpSlotType();
964     unsigned i;
965     for (i = 0; i < num_relocations; ++i)
966     {
967         if (rel.Parse(rel_data, &offset) == false)
968             break;
969 
970         if (reloc_type(rel) != slot_type)
971             continue;
972 
973         unsigned symbol_offset = reloc_symbol(rel) * sym_hdr->sh_entsize;
974         uint64_t plt_index = (i + 1) * plt_entsize;
975 
976         if (!symbol.Parse(symtab_data, &symbol_offset))
977             break;
978 
979         const char *symbol_name = strtab_data.PeekCStr(symbol.st_name);
980         bool is_mangled = symbol_name ? (symbol_name[0] == '_' && symbol_name[1] == 'Z') : false;
981 
982         Symbol jump_symbol(
983             i + start_id,    // Symbol table index
984             symbol_name,     // symbol name.
985             is_mangled,      // is the symbol name mangled?
986             eSymbolTypeTrampoline, // Type of this symbol
987             false,           // Is this globally visible?
988             false,           // Is this symbol debug info?
989             true,            // Is this symbol a trampoline?
990             true,            // Is this symbol artificial?
991             plt_section_sp,  // Section in which this symbol is defined or null.
992             plt_index,       // Offset in section or symbol value.
993             plt_entsize,     // Size in bytes of this symbol.
994             0);              // Symbol flags.
995 
996         symbol_table->AddSymbol(jump_symbol);
997     }
998 
999     return i;
1000 }
1001 
1002 unsigned
1003 ObjectFileELF::ParseTrampolineSymbols(Symtab *symbol_table,
1004                                       user_id_t start_id,
1005                                       const ELFSectionHeader *rel_hdr,
1006                                       user_id_t rel_id)
1007 {
1008     assert(rel_hdr->sh_type == SHT_RELA || rel_hdr->sh_type == SHT_REL);
1009 
1010     // The link field points to the asscoiated symbol table.  The info field
1011     // points to the section holding the plt.
1012     user_id_t symtab_id = rel_hdr->sh_link;
1013     user_id_t plt_id = rel_hdr->sh_info;
1014 
1015     if (!symtab_id || !plt_id)
1016         return 0;
1017 
1018     // Section ID's are ones based;
1019     symtab_id++;
1020     plt_id++;
1021 
1022     const ELFSectionHeader *plt_hdr = GetSectionHeaderByIndex(plt_id);
1023     if (!plt_hdr)
1024         return 0;
1025 
1026     const ELFSectionHeader *sym_hdr = GetSectionHeaderByIndex(symtab_id);
1027     if (!sym_hdr)
1028         return 0;
1029 
1030     SectionList *section_list = GetSectionList();
1031     if (!section_list)
1032         return 0;
1033 
1034     Section *rel_section = section_list->FindSectionByID(rel_id).get();
1035     if (!rel_section)
1036         return 0;
1037 
1038     SectionSP plt_section_sp (section_list->FindSectionByID(plt_id));
1039     if (!plt_section_sp)
1040         return 0;
1041 
1042     Section *symtab = section_list->FindSectionByID(symtab_id).get();
1043     if (!symtab)
1044         return 0;
1045 
1046     Section *strtab = section_list->FindSectionByID(sym_hdr->sh_link + 1).get();
1047     if (!strtab)
1048         return 0;
1049 
1050     DataExtractor rel_data;
1051     if (!ReadSectionData(rel_section, rel_data))
1052         return 0;
1053 
1054     DataExtractor symtab_data;
1055     if (!ReadSectionData(symtab, symtab_data))
1056         return 0;
1057 
1058     DataExtractor strtab_data;
1059     if (!ReadSectionData(strtab, strtab_data))
1060         return 0;
1061 
1062     unsigned rel_type = PLTRelocationType();
1063     if (!rel_type)
1064         return 0;
1065 
1066     return ParsePLTRelocations (symbol_table,
1067                                 start_id,
1068                                 rel_type,
1069                                 &m_header,
1070                                 rel_hdr,
1071                                 plt_hdr,
1072                                 sym_hdr,
1073                                 plt_section_sp,
1074                                 rel_data,
1075                                 symtab_data,
1076                                 strtab_data);
1077 }
1078 
1079 Symtab *
1080 ObjectFileELF::GetSymtab()
1081 {
1082     if (m_symtab_ap.get())
1083         return m_symtab_ap.get();
1084 
1085     Symtab *symbol_table = new Symtab(this);
1086     m_symtab_ap.reset(symbol_table);
1087 
1088     Mutex::Locker locker(symbol_table->GetMutex());
1089 
1090     if (!(ParseSectionHeaders() && GetSectionHeaderStringTable()))
1091         return symbol_table;
1092 
1093     // Locate and parse all linker symbol tables.
1094     uint64_t symbol_id = 0;
1095     for (SectionHeaderCollIter I = m_section_headers.begin();
1096          I != m_section_headers.end(); ++I)
1097     {
1098         if (I->sh_type == SHT_SYMTAB || I->sh_type == SHT_DYNSYM)
1099         {
1100             const ELFSectionHeader &symtab_header = *I;
1101             user_id_t section_id = SectionIndex(I);
1102             symbol_id += ParseSymbolTable(symbol_table, symbol_id,
1103                                           &symtab_header, section_id);
1104         }
1105     }
1106 
1107     // Synthesize trampoline symbols to help navigate the PLT.
1108     Section *reloc_section = PLTSection();
1109     if (reloc_section)
1110     {
1111         user_id_t reloc_id = reloc_section->GetID();
1112         const ELFSectionHeader *reloc_header = GetSectionHeaderByIndex(reloc_id);
1113         assert(reloc_header);
1114 
1115         ParseTrampolineSymbols(symbol_table, symbol_id, reloc_header, reloc_id);
1116     }
1117 
1118     return symbol_table;
1119 }
1120 
1121 //===----------------------------------------------------------------------===//
1122 // Dump
1123 //
1124 // Dump the specifics of the runtime file container (such as any headers
1125 // segments, sections, etc).
1126 //----------------------------------------------------------------------
1127 void
1128 ObjectFileELF::Dump(Stream *s)
1129 {
1130     DumpELFHeader(s, m_header);
1131     s->EOL();
1132     DumpELFProgramHeaders(s);
1133     s->EOL();
1134     DumpELFSectionHeaders(s);
1135     s->EOL();
1136     SectionList *section_list = GetSectionList();
1137     if (section_list)
1138         section_list->Dump(s, NULL, true, UINT32_MAX);
1139     Symtab *symtab = GetSymtab();
1140     if (symtab)
1141         symtab->Dump(s, NULL, eSortOrderNone);
1142     s->EOL();
1143     DumpDependentModules(s);
1144     s->EOL();
1145 }
1146 
1147 //----------------------------------------------------------------------
1148 // DumpELFHeader
1149 //
1150 // Dump the ELF header to the specified output stream
1151 //----------------------------------------------------------------------
1152 void
1153 ObjectFileELF::DumpELFHeader(Stream *s, const ELFHeader &header)
1154 {
1155     s->PutCString("ELF Header\n");
1156     s->Printf("e_ident[EI_MAG0   ] = 0x%2.2x\n", header.e_ident[EI_MAG0]);
1157     s->Printf("e_ident[EI_MAG1   ] = 0x%2.2x '%c'\n",
1158               header.e_ident[EI_MAG1], header.e_ident[EI_MAG1]);
1159     s->Printf("e_ident[EI_MAG2   ] = 0x%2.2x '%c'\n",
1160               header.e_ident[EI_MAG2], header.e_ident[EI_MAG2]);
1161     s->Printf("e_ident[EI_MAG3   ] = 0x%2.2x '%c'\n",
1162               header.e_ident[EI_MAG3], header.e_ident[EI_MAG3]);
1163 
1164     s->Printf("e_ident[EI_CLASS  ] = 0x%2.2x\n", header.e_ident[EI_CLASS]);
1165     s->Printf("e_ident[EI_DATA   ] = 0x%2.2x ", header.e_ident[EI_DATA]);
1166     DumpELFHeader_e_ident_EI_DATA(s, header.e_ident[EI_DATA]);
1167     s->Printf ("\ne_ident[EI_VERSION] = 0x%2.2x\n", header.e_ident[EI_VERSION]);
1168     s->Printf ("e_ident[EI_PAD    ] = 0x%2.2x\n", header.e_ident[EI_PAD]);
1169 
1170     s->Printf("e_type      = 0x%4.4x ", header.e_type);
1171     DumpELFHeader_e_type(s, header.e_type);
1172     s->Printf("\ne_machine   = 0x%4.4x\n", header.e_machine);
1173     s->Printf("e_version   = 0x%8.8x\n", header.e_version);
1174     s->Printf("e_entry     = 0x%8.8llx\n", header.e_entry);
1175     s->Printf("e_phoff     = 0x%8.8llx\n", header.e_phoff);
1176     s->Printf("e_shoff     = 0x%8.8llx\n", header.e_shoff);
1177     s->Printf("e_flags     = 0x%8.8x\n", header.e_flags);
1178     s->Printf("e_ehsize    = 0x%4.4x\n", header.e_ehsize);
1179     s->Printf("e_phentsize = 0x%4.4x\n", header.e_phentsize);
1180     s->Printf("e_phnum     = 0x%4.4x\n", header.e_phnum);
1181     s->Printf("e_shentsize = 0x%4.4x\n", header.e_shentsize);
1182     s->Printf("e_shnum     = 0x%4.4x\n", header.e_shnum);
1183     s->Printf("e_shstrndx  = 0x%4.4x\n", header.e_shstrndx);
1184 }
1185 
1186 //----------------------------------------------------------------------
1187 // DumpELFHeader_e_type
1188 //
1189 // Dump an token value for the ELF header member e_type
1190 //----------------------------------------------------------------------
1191 void
1192 ObjectFileELF::DumpELFHeader_e_type(Stream *s, elf_half e_type)
1193 {
1194     switch (e_type)
1195     {
1196     case ET_NONE:   *s << "ET_NONE"; break;
1197     case ET_REL:    *s << "ET_REL"; break;
1198     case ET_EXEC:   *s << "ET_EXEC"; break;
1199     case ET_DYN:    *s << "ET_DYN"; break;
1200     case ET_CORE:   *s << "ET_CORE"; break;
1201     default:
1202         break;
1203     }
1204 }
1205 
1206 //----------------------------------------------------------------------
1207 // DumpELFHeader_e_ident_EI_DATA
1208 //
1209 // Dump an token value for the ELF header member e_ident[EI_DATA]
1210 //----------------------------------------------------------------------
1211 void
1212 ObjectFileELF::DumpELFHeader_e_ident_EI_DATA(Stream *s, unsigned char ei_data)
1213 {
1214     switch (ei_data)
1215     {
1216     case ELFDATANONE:   *s << "ELFDATANONE"; break;
1217     case ELFDATA2LSB:   *s << "ELFDATA2LSB - Little Endian"; break;
1218     case ELFDATA2MSB:   *s << "ELFDATA2MSB - Big Endian"; break;
1219     default:
1220         break;
1221     }
1222 }
1223 
1224 
1225 //----------------------------------------------------------------------
1226 // DumpELFProgramHeader
1227 //
1228 // Dump a single ELF program header to the specified output stream
1229 //----------------------------------------------------------------------
1230 void
1231 ObjectFileELF::DumpELFProgramHeader(Stream *s, const ELFProgramHeader &ph)
1232 {
1233     DumpELFProgramHeader_p_type(s, ph.p_type);
1234     s->Printf(" %8.8llx %8.8llx %8.8llx", ph.p_offset, ph.p_vaddr, ph.p_paddr);
1235     s->Printf(" %8.8llx %8.8llx %8.8x (", ph.p_filesz, ph.p_memsz, ph.p_flags);
1236 
1237     DumpELFProgramHeader_p_flags(s, ph.p_flags);
1238     s->Printf(") %8.8llx", ph.p_align);
1239 }
1240 
1241 //----------------------------------------------------------------------
1242 // DumpELFProgramHeader_p_type
1243 //
1244 // Dump an token value for the ELF program header member p_type which
1245 // describes the type of the program header
1246 // ----------------------------------------------------------------------
1247 void
1248 ObjectFileELF::DumpELFProgramHeader_p_type(Stream *s, elf_word p_type)
1249 {
1250     const int kStrWidth = 10;
1251     switch (p_type)
1252     {
1253     CASE_AND_STREAM(s, PT_NULL      , kStrWidth);
1254     CASE_AND_STREAM(s, PT_LOAD      , kStrWidth);
1255     CASE_AND_STREAM(s, PT_DYNAMIC   , kStrWidth);
1256     CASE_AND_STREAM(s, PT_INTERP    , kStrWidth);
1257     CASE_AND_STREAM(s, PT_NOTE      , kStrWidth);
1258     CASE_AND_STREAM(s, PT_SHLIB     , kStrWidth);
1259     CASE_AND_STREAM(s, PT_PHDR      , kStrWidth);
1260     default:
1261         s->Printf("0x%8.8x%*s", p_type, kStrWidth - 10, "");
1262         break;
1263     }
1264 }
1265 
1266 
1267 //----------------------------------------------------------------------
1268 // DumpELFProgramHeader_p_flags
1269 //
1270 // Dump an token value for the ELF program header member p_flags
1271 //----------------------------------------------------------------------
1272 void
1273 ObjectFileELF::DumpELFProgramHeader_p_flags(Stream *s, elf_word p_flags)
1274 {
1275     *s  << ((p_flags & PF_X) ? "PF_X" : "    ")
1276         << (((p_flags & PF_X) && (p_flags & PF_W)) ? '+' : ' ')
1277         << ((p_flags & PF_W) ? "PF_W" : "    ")
1278         << (((p_flags & PF_W) && (p_flags & PF_R)) ? '+' : ' ')
1279         << ((p_flags & PF_R) ? "PF_R" : "    ");
1280 }
1281 
1282 //----------------------------------------------------------------------
1283 // DumpELFProgramHeaders
1284 //
1285 // Dump all of the ELF program header to the specified output stream
1286 //----------------------------------------------------------------------
1287 void
1288 ObjectFileELF::DumpELFProgramHeaders(Stream *s)
1289 {
1290     if (ParseProgramHeaders())
1291     {
1292         s->PutCString("Program Headers\n");
1293         s->PutCString("IDX  p_type     p_offset p_vaddr  p_paddr  "
1294                       "p_filesz p_memsz  p_flags                   p_align\n");
1295         s->PutCString("==== ---------- -------- -------- -------- "
1296                       "-------- -------- ------------------------- --------\n");
1297 
1298         uint32_t idx = 0;
1299         for (ProgramHeaderCollConstIter I = m_program_headers.begin();
1300              I != m_program_headers.end(); ++I, ++idx)
1301         {
1302             s->Printf("[%2u] ", idx);
1303             ObjectFileELF::DumpELFProgramHeader(s, *I);
1304             s->EOL();
1305         }
1306     }
1307 }
1308 
1309 //----------------------------------------------------------------------
1310 // DumpELFSectionHeader
1311 //
1312 // Dump a single ELF section header to the specified output stream
1313 //----------------------------------------------------------------------
1314 void
1315 ObjectFileELF::DumpELFSectionHeader(Stream *s, const ELFSectionHeader &sh)
1316 {
1317     s->Printf("%8.8x ", sh.sh_name);
1318     DumpELFSectionHeader_sh_type(s, sh.sh_type);
1319     s->Printf(" %8.8llx (", sh.sh_flags);
1320     DumpELFSectionHeader_sh_flags(s, sh.sh_flags);
1321     s->Printf(") %8.8llx %8.8llx %8.8llx", sh.sh_addr, sh.sh_offset, sh.sh_size);
1322     s->Printf(" %8.8x %8.8x", sh.sh_link, sh.sh_info);
1323     s->Printf(" %8.8llx %8.8llx", sh.sh_addralign, sh.sh_entsize);
1324 }
1325 
1326 //----------------------------------------------------------------------
1327 // DumpELFSectionHeader_sh_type
1328 //
1329 // Dump an token value for the ELF section header member sh_type which
1330 // describes the type of the section
1331 //----------------------------------------------------------------------
1332 void
1333 ObjectFileELF::DumpELFSectionHeader_sh_type(Stream *s, elf_word sh_type)
1334 {
1335     const int kStrWidth = 12;
1336     switch (sh_type)
1337     {
1338     CASE_AND_STREAM(s, SHT_NULL     , kStrWidth);
1339     CASE_AND_STREAM(s, SHT_PROGBITS , kStrWidth);
1340     CASE_AND_STREAM(s, SHT_SYMTAB   , kStrWidth);
1341     CASE_AND_STREAM(s, SHT_STRTAB   , kStrWidth);
1342     CASE_AND_STREAM(s, SHT_RELA     , kStrWidth);
1343     CASE_AND_STREAM(s, SHT_HASH     , kStrWidth);
1344     CASE_AND_STREAM(s, SHT_DYNAMIC  , kStrWidth);
1345     CASE_AND_STREAM(s, SHT_NOTE     , kStrWidth);
1346     CASE_AND_STREAM(s, SHT_NOBITS   , kStrWidth);
1347     CASE_AND_STREAM(s, SHT_REL      , kStrWidth);
1348     CASE_AND_STREAM(s, SHT_SHLIB    , kStrWidth);
1349     CASE_AND_STREAM(s, SHT_DYNSYM   , kStrWidth);
1350     CASE_AND_STREAM(s, SHT_LOPROC   , kStrWidth);
1351     CASE_AND_STREAM(s, SHT_HIPROC   , kStrWidth);
1352     CASE_AND_STREAM(s, SHT_LOUSER   , kStrWidth);
1353     CASE_AND_STREAM(s, SHT_HIUSER   , kStrWidth);
1354     default:
1355         s->Printf("0x%8.8x%*s", sh_type, kStrWidth - 10, "");
1356         break;
1357     }
1358 }
1359 
1360 //----------------------------------------------------------------------
1361 // DumpELFSectionHeader_sh_flags
1362 //
1363 // Dump an token value for the ELF section header member sh_flags
1364 //----------------------------------------------------------------------
1365 void
1366 ObjectFileELF::DumpELFSectionHeader_sh_flags(Stream *s, elf_word sh_flags)
1367 {
1368     *s  << ((sh_flags & SHF_WRITE) ? "WRITE" : "     ")
1369         << (((sh_flags & SHF_WRITE) && (sh_flags & SHF_ALLOC)) ? '+' : ' ')
1370         << ((sh_flags & SHF_ALLOC) ? "ALLOC" : "     ")
1371         << (((sh_flags & SHF_ALLOC) && (sh_flags & SHF_EXECINSTR)) ? '+' : ' ')
1372         << ((sh_flags & SHF_EXECINSTR) ? "EXECINSTR" : "         ");
1373 }
1374 
1375 //----------------------------------------------------------------------
1376 // DumpELFSectionHeaders
1377 //
1378 // Dump all of the ELF section header to the specified output stream
1379 //----------------------------------------------------------------------
1380 void
1381 ObjectFileELF::DumpELFSectionHeaders(Stream *s)
1382 {
1383     if (!(ParseSectionHeaders() && GetSectionHeaderStringTable()))
1384         return;
1385 
1386     s->PutCString("Section Headers\n");
1387     s->PutCString("IDX  name     type         flags                            "
1388                   "addr     offset   size     link     info     addralgn "
1389                   "entsize  Name\n");
1390     s->PutCString("==== -------- ------------ -------------------------------- "
1391                   "-------- -------- -------- -------- -------- -------- "
1392                   "-------- ====================\n");
1393 
1394     uint32_t idx = 0;
1395     for (SectionHeaderCollConstIter I = m_section_headers.begin();
1396          I != m_section_headers.end(); ++I, ++idx)
1397     {
1398         s->Printf("[%2u] ", idx);
1399         ObjectFileELF::DumpELFSectionHeader(s, *I);
1400         const char* section_name = m_shstr_data.PeekCStr(I->sh_name);
1401         if (section_name)
1402             *s << ' ' << section_name << "\n";
1403     }
1404 }
1405 
1406 void
1407 ObjectFileELF::DumpDependentModules(lldb_private::Stream *s)
1408 {
1409     size_t num_modules = ParseDependentModules();
1410 
1411     if (num_modules > 0)
1412     {
1413         s->PutCString("Dependent Modules:\n");
1414         for (unsigned i = 0; i < num_modules; ++i)
1415         {
1416             const FileSpec &spec = m_filespec_ap->GetFileSpecAtIndex(i);
1417             s->Printf("   %s\n", spec.GetFilename().GetCString());
1418         }
1419     }
1420 }
1421 
1422 bool
1423 ObjectFileELF::GetArchitecture (ArchSpec &arch)
1424 {
1425     if (!ParseHeader())
1426         return false;
1427 
1428     arch.SetArchitecture (eArchTypeELF, m_header.e_machine, LLDB_INVALID_CPUTYPE);
1429     arch.GetTriple().setOSName (Host::GetOSString().GetCString());
1430     arch.GetTriple().setVendorName(Host::GetVendorString().GetCString());
1431     return true;
1432 }
1433 
1434 ObjectFile::Type
1435 ObjectFileELF::CalculateType()
1436 {
1437     switch (m_header.e_type)
1438     {
1439         case llvm::ELF::ET_NONE:
1440             // 0 - No file type
1441             return eTypeUnknown;
1442 
1443         case llvm::ELF::ET_REL:
1444             // 1 - Relocatable file
1445             return eTypeObjectFile;
1446 
1447         case llvm::ELF::ET_EXEC:
1448             // 2 - Executable file
1449             return eTypeExecutable;
1450 
1451         case llvm::ELF::ET_DYN:
1452             // 3 - Shared object file
1453             return eTypeSharedLibrary;
1454 
1455         case ET_CORE:
1456             // 4 - Core file
1457             return eTypeCoreFile;
1458 
1459         default:
1460             break;
1461     }
1462     return eTypeUnknown;
1463 }
1464 
1465 ObjectFile::Strata
1466 ObjectFileELF::CalculateStrata()
1467 {
1468     switch (m_header.e_type)
1469     {
1470         case llvm::ELF::ET_NONE:
1471             // 0 - No file type
1472             return eStrataUnknown;
1473 
1474         case llvm::ELF::ET_REL:
1475             // 1 - Relocatable file
1476             return eStrataUnknown;
1477 
1478         case llvm::ELF::ET_EXEC:
1479             // 2 - Executable file
1480             // TODO: is there any way to detect that an executable is a kernel
1481             // related executable by inspecting the program headers, section
1482             // headers, symbols, or any other flag bits???
1483             return eStrataUser;
1484 
1485         case llvm::ELF::ET_DYN:
1486             // 3 - Shared object file
1487             // TODO: is there any way to detect that an shared library is a kernel
1488             // related executable by inspecting the program headers, section
1489             // headers, symbols, or any other flag bits???
1490             return eStrataUnknown;
1491 
1492         case ET_CORE:
1493             // 4 - Core file
1494             // TODO: is there any way to detect that an core file is a kernel
1495             // related executable by inspecting the program headers, section
1496             // headers, symbols, or any other flag bits???
1497             return eStrataUnknown;
1498 
1499         default:
1500             break;
1501     }
1502     return eStrataUnknown;
1503 }
1504 
1505